Wireless Networking Standards Quiz
25 Questions
0 Views

Wireless Networking Standards Quiz

Created by
@ExtraordinaryMars

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which IEEE standard designates all wireless networking standards?

  • 802.15
  • 802.11 (correct)
  • 802.1X
  • 802.3
  • How many non-overlapping channels are available in the 2.4 GHz range?

  • 11 (correct)
  • 5
  • 3
  • 8
  • Which encryption algorithm is used by WPA2?

  • RC4
  • AES (correct)
  • RSA
  • DES
  • What method allows a device to connect to a wireless network just by pressing a button?

    <p>Wi-Fi Protected Setup</p> Signup and view all the answers

    What is the primary purpose of Multi-User, Multiple-Input, Multiple-Output (MU-MIMO)?

    <p>Divide streams between multiple devices</p> Signup and view all the answers

    What type of VPN allows individual hosts to connect to a VPN server for access to network resources?

    <p>Remote access VPN</p> Signup and view all the answers

    Which VPN protocol was developed by Microsoft and primarily supports TCP/IP?

    <p>Point-to-Point Tunneling Protocol (PPTP)</p> Signup and view all the answers

    What is a key limitation of the Master Boot Record (MBR) in disk partitioning?

    <p>Does not support GPT volumes larger than 2 TB</p> Signup and view all the answers

    Which tunneling protocol encapsulates packets without providing encryption?

    <p>Generic Routing Encapsulation (GRE)</p> Signup and view all the answers

    Which of the following correctly defines Storage Spaces in Windows?

    <p>A feature that groups multiple drives into a single storage pool</p> Signup and view all the answers

    Which frequency range typically allows for greater distance but slower data transmission rates in wireless networks?

    <p>2.4 GHz</p> Signup and view all the answers

    What issue can occur if two wireless devices use the same frequency in close proximity?

    <p>Signal collision</p> Signup and view all the answers

    Which type of wireless authentication method allows any device to connect without a password?

    <p>Open network</p> Signup and view all the answers

    What technology allows for multiple-user efficiency by enabling several devices to utilize the same channel at once?

    <p>MU-MIMO</p> Signup and view all the answers

    What type of wireless network typically requires special equipment and possibly permission for licensed frequencies?

    <p>Long-range wireless</p> Signup and view all the answers

    What can happen if the power of a wireless access point is increased beyond the recommended levels?

    <p>Interference with other devices</p> Signup and view all the answers

    What is the main function of a RADIUS server in a wireless 802.1x implementation?

    <p>To centralize user account and authentication information</p> Signup and view all the answers

    Which encryption protocol is considered the best option for most wireless networks?

    <p>WPA2 or WPA3</p> Signup and view all the answers

    What does WPA2-Personal use to protect the network?

    <p>A pre-shared key (passphrase)</p> Signup and view all the answers

    What is the primary purpose of using perfect forward secrecy in WPA3?

    <p>To create a new key for every transmission</p> Signup and view all the answers

    Which security measure can create an additional barrier to potential attackers on a wireless network?

    <p>Enabling MAC address filtering</p> Signup and view all the answers

    What does the 4-way handshake in WPA2 establish between a device and access point?

    <p>A session key for encryption</p> Signup and view all the answers

    What does Remote Authentication Dial-In Service (RADIUS) primarily provide?

    <p>User authentication and authorization</p> Signup and view all the answers

    Which version of WPA2 requires a RADIUS server for user authentication?

    <p>WPA2-Enterprise</p> Signup and view all the answers

    What is the main security benefit of disabling SSID broadcast?

    <p>It makes the network less visible to casual users</p> Signup and view all the answers

    Study Notes

    Wireless Networking

    • IEEE 802.11 standard defines how wireless networks operate
    • 2.4 GHz range has 3 non-overlapping channels
    • 5 GHz range has 24 non-overlapping channels
    • WPA2 uses AES-CCMP encryption algorithm
    • Wi-Fi Protected Setup (WPS) allows devices to connect to a wireless network by pressing a button

    Authentication Protocols

    • Pre-Shared Key (PSK) uses a passphrase to authenticate users
    • Wi-Fi Protected Setup (WPS) allows automatic connection between a device and a wireless access point
    • Open network requires no authentication
    • Captive portal forces users to agree to terms or pay a fee before accessing a network

    Wireless Security

    • WPA2 uses AES-CCMP encryption algorithm
    • WPA3 uses Simultaneous Authentication of Equals (SAE) standard and perfect forward secrecy
    • 802.1x is a secure authentication method for wired and wireless networks
    • RADIUS is a triple-A protocol that provides authentication, authorization, and accounting management

    VPNs

    • VPN uses encryption to securely send IP traffic
    • Host-to-host VPN - two hosts communicate directly
    • Site-to-site VPN - routers on each site establish a connection
    • Remote access VPN - a server accepts VPN connections from individual hosts

    VPN Protocols

    • Point-to-Point Tunneling Protocol (PPTP) uses CHAP and PAP for authentication
    • Layer 2 Tunneling Protocol (L2TP) uses IPsec for encryption
    • IPsec offers authentication and encryption through Authentication Header (AH) and Encapsulating Security Payload (ESP)

    Hard Drive Basics

    • Hard disk drive (HDD) has spinning metal platters
    • Solid-state drive (SSD) uses flash memory chips and has no moving parts
    • MBR (Master Boot Record) partitions are used on older 32-bit computers and have a 2 TB drive size limit
    • GPT (GUID Partition Table) supports volumes larger than 2 TB

    Disk Management

    • Storage Spaces groups two or more drives into a storage pool
    • Storage pools can be configured in different ways:
      • Simple - acts as a single drive
      • Mirrored - duplicates data across multiple drives
      • Parity - uses a single drive for parity data for redundancy
      • Tiered - uses drives with different performance for different types of data

    Storage Devices

    • Solid-state drive (SSD): Stores data on flash memory chips, retains data even without power. Has no moving parts.
    • Physical hard drive can be split into multiple logical drives by creating volumes or partitions.
    • Windows client partitioning supports two types:
      • GUID Partition Table (GPT): Used by modern devices, provides more features, supports volumes larger than 2 TB.
      • Master Boot Record (MBR): Used by older 32-bit systems, has removable drives.

    Disk Management

    • Windows system utility for managing and configuring storage devices.
    • Accessible via:
      • Right-click Start button > Disk Management.
      • Search taskbar for "diskmgmt.msc".
      • Right-click Start button > Computer Management > Disk Management.
      • Type "diskmgmt" in PowerShell or Command Prompt.

    Storage Spaces

    • Introduced in Windows 8.
    • Provide redundancy and increased performance.
    • Similar to RAID configurations, but managed by Windows.
    • Require at least two drives in addition to the Windows drive.
    • Cannot include the drive with Windows installed.
    • Require creating a storage pool.

    Storage Pools

    • Collection of disks forming one large storage space.
    • Partitioned disks cannot be added.
    • Can be configured with different resiliency types for data replication.

    Simple Space

    • Designed for performance without data redundancy.
    • Data split evenly between drives, reducing processing time.
    • Comparable to RAID 0 configuration.
    • Best for temporary data like video rendering or image editing.

    Mirror Space

    • Designed for performance and data protection.
    • Replicates data to multiple disks.
    • Resiliency types:
      • Two-way mirror: Requires two drives, writes two copies of data, allows one disk failure. Comparable to RAID 1.
      • Three-way mirror: Requires five drives, writes three copies of data, allows two simultaneous drive failures. Comparable to RAID 1 and RAID 5.

    Parity Space

    • Provides data redundancy, comparable to RAID 5.
    • Requires at least three drives.
    • Uses parity information on each drive to recover data in case of a drive failure.
    • Allows for one drive failure with three drives, two drive failures with seven drives.

    Dual Parity Space

    • Writes data with parity information on two disks for two drive failure protection.
    • Requires at least five physical disks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on wireless networking standards and technologies with this quiz. Questions cover topics such as IEEE standards, encryption methods, VPN protocols, and wireless communication techniques. Perfect for students and professionals looking to brush up on their networking skills.

    More Like This

    Wireless Networking &amp; Security Quiz
    10 questions
    Wireless Security Best Practices
    5 questions
    Wireless Networking Flashcards - Week 5
    3 questions
    Use Quizgecko on...
    Browser
    Browser